Icon Crear Crear
Obtener Plan Académico
Obtener Plan Académico
Obtener Plan Académico

Emoji Pictionary

Test

Identify terminology based on the Pictionary provided

Descarga la versión para jugar en papel

107 veces realizada

Creada por

India

Top 10 resultados

  1. 1
    03:00
    tiempo
    100
    puntuacion
  2. 2
    02:43
    tiempo
    70
    puntuacion
  3. 3
    Smita
    Smita
    08:20
    tiempo
    30
    puntuacion
  4. 4
    01:02
    tiempo
    10
    puntuacion
  5. 5
    Dina
    Dina
    00:08
    tiempo
    0
    puntuacion
  6. 6
    MANOJ
    MANOJ
    00:32
    tiempo
    0
    puntuacion
¿Quieres aparecer en el Top 10 de este juego? para identificarte.
Crea tu propio juego gratis desde nuestro creador de juegos
Compite contra tus amigos para ver quien consigue la mejor puntuación en esta actividad

Top juegos

  1. tiempo
    puntuacion
  1. tiempo
    puntuacion
tiempo
puntuacion
tiempo
puntuacion
 
game-icon

Emoji PictionaryVersión en línea

Identify terminology based on the Pictionary provided

por cybergamification esflabs
1

Written answer

2

Written answer

3

Written answer

4

Written answer

5

Written answer

6

Written answer

7

Written answer

8

Written answer

9

Written answer

10

Written answer

Feedback

Deep Web: is the part of the internet that is not indexed by search engines Dark Web: A small subset of the deep web that requires specific software, like Tor often associated with illegal activities but also serves as a space for anonymous communication

A security method that adds an extra layer of protection to your online accounts. Instead of just entering a password, you also need to provide a second form of verification

A security system that monitors and controls incoming and outgoing network traffic. It acts as a barrier between a trusted internal network and untrusted external networks, such as the internet.

IP address: allows devices to send and receive information over the internet by providing a specific address that identifies both the device and its location on the network.

Blackhat Hacker is who uses their technical skills to exploit computer systems and networks for malicious purposes, such as stealing data or causing damage.

Sandbox is a secure, isolated environment used to safely test and analyze potentially malicious code or programs without risking harm to the actual computer system or network.

Encryption is the process of converting information into a coded format that can only be accessed or read by authorized parties.

Ransomware is a type of malicious software that encrypts a victim's files, denying them access until a ransom is paid to the attacker.

Antivirus software is a security program designed to detect, prevent, and remove malware from computers and networks.

Phishing emails are deceptive messages that mimic legitimate sources to trick recipients into revealing sensitive information or clicking on malicious links.

educaplay suscripción